Privacy-preserving similarity evaluation and application to remote biometrics authentication

H Kikuchi, K Nagai, W Ogata, M Nishigaki - Modeling Decisions for …, 2008 - Springer
In this paper, a new method for secure remote biometric authentication preventing the
vulnerability of compromised biometrics is presented. The idea is based on a public-key …

[PDF][PDF] Privacy-preserving similarity evaluation and application to remote biometrics authentication

H Kikuchi, K Nagai, W Ogata, M Nishigaki - 2009 - Citeseer
In this paper, a new method for secure remote biometric authentication preventing the
vulnerability of compromised biometrics is presented. The idea is based on a public-key …

Privacy-preserving similarity evaluation and application to remote biometrics authentication

H Kikuchi, K Nagai, W Ogata, M Nishigaki - Soft Computing, 2010 - search.proquest.com
In this paper, a new method for secure remote biometric authentication preventing the
vulnerability of compromised biometrics is presented. The idea is based on a public-key …

Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication

H Kikuchi, K Nagai, W Ogata… - Modeling Decisions for …, 2008 - books.google.com
In this paper, a new method for secure remote biometric authentication preventing the
vulnerability of compromised biometrics is presented. The idea is based on a public-key …

Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication

H Kikuchi, K Nagai, W Ogata, M Nishigaki - Proceedings of the 5th …, 2008 - dl.acm.org
In this paper, a new method for secure remote biometric authentication preventing the
vulnerability of compromised biometrics is presented. The idea is based on a public-key …

Privacy-preserving similarity evaluation and application to remote biometrics authentication

H Kikuchi, K Nagai, W Ogata, M Nishigaki - Soft Computing, 2010 - infona.pl
In this paper, a new method for secure remote biometric authentication preventing the
vulnerability of compromised biometrics is presented. The idea is based on a public-key …

Privacy-preserving similarity evaluation and application to remote biometrics authentication

H Kikuchi, K Nagai, W Ogata, M Nishigaki - Soft Computing, 2010 - Springer
In this paper, a new method for secure remote biometric authentication preventing the
vulnerability of compromised biometrics is presented. The idea is based on a public-key …

Privacy-preserving similarity evaluation and application to remote biometrics authentication.

H Kikuchi, K Nagai, W Ogata… - Soft Computing-A …, 2010 - search.ebscohost.com
Abstract In this paper, a new method for secure remote biometric authentication preventing
the vulnerability of compromised biometrics is presented. The idea is based on a public-key …

[引用][C] Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication

H Kikuchi - Modeling Decisions for Artificial Intelligence, 2008 - cir.nii.ac.jp
Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics
Authentication | CiNii Research CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ …

[引用][C] Privacy-Preserving similarity Evaluation and Application to Remote Biometrics Authentication

尾形わかは - Modeling Decisions for Artificial Intelligence, LNCS …, 2009 - cir.nii.ac.jp
Privacy-Preserving similarity Evaluation and Application to Remote Biometrics Authentication |
CiNii Research CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ …